Yuan Kong

When asymmetric cryptography techniques are used in wireless networks, the public
keys of the nodes need to be widely available and signed by a Certificate Authority (CA).
However, the existence of a single CA in large wireless networks such as mob...